• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Sys & Infrast Lifecycle Mngt 1

Information Technology Audit and Cybersecurity, Temple University

Sys & Infrast Lifecycle Mngt 1

MIS 5203.001 ■ Spring 2020 ■ Wade Mackey
  • Home
  • Syllabus
    • Gradebook
  • Announcements
  • Course Work
    • 1 – Intro/SDLC
    • Planning
      • 2 – Prjct Mngmt & Governance
      • 3 – Business Case & Feasibility
    • Analysis
      • 4 – Requirements Determination
      • 5 – Process Modeling
      • 6 – Data Modeling
      • 7 -Test One
    • Design
      • 10 – HCI (UI)
      • 8 – Database
      • 9 – Software
      • 11 – Test Two
    • Implementation
      • 12 – Architecture
      • 13 – Development & Testing
      • 14 – Migration & Deployment
      • Test 3: Implementation
  • Projects
    • Project 1: Business Case Development
    • Project 2: SDLC
    • Project 3: Systems Design
    • Project 4: Process Re-engineering
    • Project 5: Controls

5 – Process Modeling

“Data flow diagrams enable you to model how data flow through an information system, the relationships among the data flows, and how data come to be stored at specific locations. Data flow diagrams also show the processes that change or transform data. Because data flow diagrams concentrate on the movement of data between processes, these diagrams are called process models .”  (Modern Systems Analysis and Design, 8th ed, Joseph Valacich)

Objectives:

  • understand the logical modeling of processes by studying examples of data flow diagrams,
  • draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models,
  • decompose data flow diagrams into lower-level diagrams,
  • balance higher-level and lower-level data flow diagrams,
  • use data flow diagrams as a tool to support the analysis of information systems,
  • discuss process modeling for electronic commerce applications, and
  • use decision tables to represent the logic of choice in conditional statements.

Topics:

From Modern Systems Analysis and Design:

7. Structured System Process Requirements
7.1. Process Modeling
7.1.1. Data Flow Diagraming
7.1.2. Decision Modeling

From CISA:

3.1. System Development Methodologies
SDLC Phases
3.1.1.1. Acquisition
3.1.1.1.1. Design
3.1.1.1.1.1. Structured Techniques

From Secure Software Design:

1.2. Vulnerability Mapping
1.2.1. The Misuse Case
1.2.2. Diagramming Sensitive Dataflows
1.2.3. Data Diagramming and the Trust Boundary

In this unit, plan to:

  • Participate in the class discussion thread
  • Read the assigned topics in CISA
  • Read selected readings from Secure Software Design
  • Read chapter 7 in Modern Systems Analysis and Design

Primary Sidebar

RECENT ANNOUNCEMENTS

“School District reports a 334% hike in cybersecurity insurance costs”

A school district in Chicago released details on its cyber-insurance, from … [More...] about “School District reports a 334% hike in cybersecurity insurance costs”

“Security Flaws Seen in China’s Mandatory Olympics App for Athletes”

The article I read this week was from the New York Times, and it describes … [More...] about “Security Flaws Seen in China’s Mandatory Olympics App for Athletes”

“‘Preparation, not panic’: Top US cyber official asks Americans to look out for Russian hacking efforts”

by Sean Lyngaas 3/26/22 To summarize this article, the United States … [More...] about “‘Preparation, not panic’: Top US cyber official asks Americans to look out for Russian hacking efforts”

Cisco Umbrella default SSH key allows theft of admin credentials

Cisco Umbrella default SSH key allows theft of admin credentials … [More...] about Cisco Umbrella default SSH key allows theft of admin credentials

The battle over end-to-end encryption

The BBC article, “The battle over end-to-end encryption, is news to … [More...] about The battle over end-to-end encryption

Hackers Using Device Registration Trick to Attack Enterprise with Lateral Phishing

This article explains the email-based social engineering of criminals to … [More...] about Hackers Using Device Registration Trick to Attack Enterprise with Lateral Phishing

[More Announcements...]

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University